Security Vulnerability Database
50 vulnerabilities with real code examples, exploit scenarios, and fix instructions.
Exposed Secrets
Stripe API Keys Committed to Source Code
criticalLearn why Stripe API keys in source code are critical vulnerabilities. See real examples and how to fix exposed Stripe secret keys in your codebase.
.env File Accessible Publicly or Committed to Git
criticalDiscover how exposed .env files leak database passwords, API keys, and secrets. Learn to secure your .env files from public access and git commits.
GitHub Personal Access Token Leaked in Code
criticalGitHub personal access tokens in source code let attackers access private repos and push malicious code. Learn how to detect and fix token leaks.
Database Credentials Hardcoded in Application Source
criticalHardcoded database passwords give attackers direct access to your data. Learn why this happens and how to properly manage database credentials.
AWS Access Keys Committed to Source Code
criticalExposed AWS access keys let attackers take over your cloud account. Learn how to detect leaked AWS keys and secure your credentials properly.
JWT Signing Secret Hardcoded in Application Source
highA hardcoded JWT secret lets attackers forge authentication tokens and impersonate users. Learn how to secure JWT signing keys properly.
Firebase Service Account Key Exposed in Client Code
highExposed Firebase service account keys give attackers full admin access to your project. Learn how to detect and fix this critical vulnerability.
Encryption Key Hardcoded in Application Source
highHardcoded encryption keys make your encryption useless. Learn how to properly manage encryption keys using environment variables and KMS.
Slack Webhook URL Committed to Source Code
mediumExposed Slack webhook URLs let attackers post phishing messages to your channels. Learn how to secure Slack webhooks and prevent abuse.
SSH Private Key Committed to Version Control
criticalSSH private keys in git repos give attackers direct server access. Learn how to detect exposed SSH keys and secure your deployment process.
Web Security
CORS Wildcard Misconfiguration Allows Unauthorized Cross-Origin Access
highLearn why setting Access-Control-Allow-Origin to * is dangerous, how attackers exploit permissive CORS policies, and how to configure a secure origin allowlist.
Missing Content Security Policy Header Enables Script Injection
mediumDiscover why a missing Content Security Policy header leaves your app open to XSS attacks and how to build a robust CSP for Next.js and Express applications.
Missing HTTP Security Headers Expose Application to Common Attacks
mediumLearn which HTTP security headers your app needs, why missing them is risky, and how to add X-Frame-Options, HSTS, and more in Next.js and Express.
Open Redirect Vulnerability Enables Phishing and Token Theft
mediumUnderstand how open redirect vulnerabilities enable phishing attacks, learn to identify unsafe redirect patterns, and implement proper URL validation in your app.
Clickjacking Vulnerability Due to Missing Frame Protection
mediumLearn how clickjacking attacks work, why missing X-Frame-Options headers are dangerous, and how to protect your app with frame-ancestors and CSP directives.
Missing HTTPS Redirect Exposes Traffic to Interception
highLearn why missing HTTP-to-HTTPS redirects expose your users to man-in-the-middle attacks and how to configure proper redirects with HSTS.
Insecure Cookie Flags Allow Session Hijacking and CSRF
highUnderstand why missing Secure, HttpOnly, and SameSite cookie flags are dangerous and learn how to configure cookies correctly in Next.js and Express.
Exposed Source Maps in Production Leak Application Source Code
mediumLearn why publicly accessible source maps in production reveal your entire frontend codebase and how to disable or restrict them in Next.js and Webpack.
Missing CSRF Protection Allows Unauthorized State-Changing Requests
highUnderstand how CSRF attacks exploit cookie-based authentication, learn the synchronizer token pattern, and implement CSRF protection in Next.js APIs.
Missing Subresource Integrity on CDN Scripts Enables Supply Chain Attacks
lowLearn how missing Subresource Integrity hashes on CDN scripts expose your app to supply chain attacks and how to generate and maintain SRI hashes.
Infrastructure
AWS S3 Bucket With Public Access Enabled
criticalLearn why public AWS S3 buckets cause data breaches and how to lock them down with Block Public Access, IAM policies, and automated auditing.
Overly Permissive AWS IAM Policies
criticalWildcard IAM policies grant full AWS account access. Learn how to audit, scope, and lock down IAM roles using least privilege principles.
Docker Socket Exposed to Containers
criticalMounting docker.sock in containers grants host root access. Learn secure alternatives like socket proxies, rootless Docker, and Kaniko.
Admin Panel Accessible Without Authentication
highPublic admin panels let attackers control your application. Learn to secure them with VPNs, authentication, IP restrictions, and network segmentation.
Debug Mode Enabled in Production
highDebug mode in production leaks source code, secrets, and database details. Learn how to disable it and use safe configuration defaults.
No Rate Limiting on API Endpoints
mediumAPIs without rate limiting are vulnerable to brute-force, scraping, and DDoS attacks. Learn to implement rate limits with Express and nginx.
Git Directory Accessible via Web Server
highAn accessible .git folder lets attackers download your full repo, including secrets. Learn to block it with nginx rules and secure deployments.
GraphQL Introspection Enabled in Production
mediumGraphQL introspection exposes your entire API schema to attackers. Learn to disable it in production and add field-level authorization.
Stack Traces and Error Details Shown to Users
mediumDetailed error messages reveal stack traces, queries, and file paths. Learn to implement safe error handling with logging and correlation IDs.
MongoDB Running Without Authentication
criticalUnauthenticated MongoDB instances are targeted by ransomware bots. Learn to enable auth, bind to localhost, and secure your database.
Code Injection
SQL Injection via Unsanitized Input
criticalLearn how SQL injection attacks work, see vulnerable and fixed code examples, and discover best practices for preventing SQLi in your applications.
Cross-Site Scripting (XSS)
highUnderstand how XSS attacks work, explore real-world vulnerable code patterns, and learn how to prevent cross-site scripting in modern web apps.
OS Command Injection
criticalLearn how OS command injection attacks exploit shell execution in Node.js apps, and discover secure alternatives to prevent arbitrary command execution.
Server-Side Request Forgery (SSRF)
highUnderstand server-side request forgery, learn how attackers reach internal services through your app, and implement defenses to block SSRF.
Path Traversal (Directory Traversal)
highLearn how path traversal attacks escape upload directories, read sensitive files, and how to validate file paths to prevent directory traversal.
JavaScript Prototype Pollution
highUnderstand JavaScript prototype pollution, how attackers exploit deep merge functions, and learn safe coding patterns to prevent prototype chain attacks.
Insecure Deserialization of User Input
criticalLearn how insecure deserialization enables remote code execution, see examples in Python and Node.js, and discover how to safely handle serialized data.
Server-Side Template Injection (SSTI)
criticalDiscover how server-side template injection works, learn to detect SSTI in Flask and Express apps, and implement fixes to prevent template-based RCE.
XML External Entity (XXE) Attack
highLearn how XXE attacks exploit XML parsers to read files and perform SSRF, and discover how to configure your parser securely to prevent XXE.
NoSQL Injection in MongoDB Queries
highLearn how NoSQL injection attacks bypass MongoDB authentication, see real exploit payloads, and implement input validation to secure your queries.
Authentication
API Endpoints Without Authentication Checks
criticalLearn how missing authentication on API endpoints exposes data, and discover patterns for enforcing auth on every route by default.
Insecure Direct Object Reference (IDOR)
highUnderstand how IDOR attacks let users access other users' data by changing IDs, and learn how to implement proper authorization checks.
Weak Password Hashing (MD5/SHA1)
highUnderstand why MD5 and SHA1 are unsafe for passwords, see GPU cracking speeds, and learn to migrate to bcrypt or Argon2 for proper password security.
Session Fixation Attacks
highLearn how session fixation attacks hijack user sessions, why session regeneration is critical, and how to secure your session management.
Insecure OAuth Configuration
highDiscover common OAuth 2.0 misconfigurations, learn why the state parameter matters, and implement secure token handling in your authentication flow.
Default Admin Credentials in Production
criticalLearn why default passwords are one of the most exploited vulnerabilities, and implement deployment checks to ensure credentials are always changed.
Missing Input Validation on User Data
highLearn why server-side input validation is essential, see how missing validation enables attacks, and implement schema-based validation with Zod.
Unrestricted File Upload Vulnerabilities
highLearn how unrestricted file uploads enable web shell attacks and remote code execution, and implement content validation to secure file handling.
Broken Access Control and Missing Authorization
criticalLearn how broken access control lets regular users reach admin features, and implement role-based authorization to enforce least privilege.
Insecure Password Reset Flow
highLearn how insecure password reset flows enable account takeover, and implement secure token generation, expiration, and validation patterns.
Scan Your Site for Free
Enter any URL to check for security vulnerabilities, misconfigurations, and exposed secrets in seconds.